- SE Dots: Sensitive and Extensible Framework for cross-region DDoS processing; Su, Li
- SPDS: A supervised private data sharing model based on blockchain technology; liu, zheli; Gao, Jiqiang; Sun, Mengyao; Yin, Mingxin; Guo, Xiaojie; Zhang, Jianzhong
- Research on Intelligent Network Linked Vehicle Information Security Risk Assessment; zhang, yanan; Han, Shengqiang
- Research on the construction of vehicle binary firmware vulnerability monitoring system; zhang, yanan;Han, Shengqiang
- Research on Information Security Test Evaluation Method Based on Intelligent Connected Vehicle; Zhang, Yanan; Han, Shengqiang
- A Trusted International Settlement Solution Based on Cross Check of CDRs; Ran, Peng; Su, Li
- Cryptanalysis of a public key cryptosystem based on data complexity under quantum environment; Jing, Zheng Jun; Gu, Chunsheng; Shi, Peizhong
- Review on identification and trust techniques compatible with eIDAS regulation; Mocanu, Stefan; Chiriac, Ana Maria; Lacatusu, Andrei; Dobrescu, Radu; Saru, Daniela
- A RBAC Model Based on Identity-Based Cryptosystem in Cloud Storage; Xu, Jian; Yu, Yanbo; Meng, Qingyu; Wu, Qiyu; Zhou, Fucai
- Blockchain-based Video Report and Trust Management in SDN-Enabled 5G-VANET; Xie, Lixia; Ding, Ying; Yang, Hongyu
- State Consistency Checking for Non Reentrant Function Based on Taint Assisted Symbol Execution; Yu, Bo; Yang, Qiang; Song, Congxi
- Network risk assessment based on improved MulVAL framework and HMM; Wang, Chundong; Li, Kongbo
- A Blockchain-based Digital Advertising Media Promotion System; Ding, Yong; Luo, Decun; Wang, Yujue; Xiang, Hengkui; Tang, Chenjun; Liu, Lingang; Zou, Xiuqing; Li, Shijie
- A semi-supervised method for classifying unknown protocols; Zhu, Peihao; Zhang, Shuzhuang; Luo, Hao; Wu, Zhigang
- Coordinated Web Scan Detection Based on Hierarchical Correlation; Yang, Jing; Wang, Liming; Xu, Zhen; Wang, Jigang; Tian, Tian
- Design of an Urban Waterlogging Monitoring System based on Internet of Things; Liu, Jiachen; Li, Wuyungerile; Bao, Yintu; Jia, Bing
- Design of ZigBee-based Energy Harvesting Wireless Sensor Network And Modeling of Solar Energy; liu, yingcong; Li, Wuyungerile; Meng, Baoyintu; Jia, Bing
- A Practical Group Signatures for Providing Privacy-Preserving Authentication with Revocation; Yue, Xiaohan; Xu, Jian; Chen, Bing; He, Yuan
- Zone based Lossy Image Compression using Discrete Wavelet and Discrete Cosine Transformations; Ahmad, Nafees; Iqbal, Khalid; Han, Lansheng; Iqbal, Naeem; Abid, Muhammad Adil
- BL-IDS:Detecting Web Attacks Using Bi-LSTM Model Based on Deep Learning; hao, saiyu; long, jun
- Privacy Preservation in Publishing Electronic Health Records Based on Perturbation; Yao, Lin; Wang, Xinyu; Chen, Zhenyu; Wu, Guowei
- A Posted Pricing Mechanism Based on Random Forest in Crowdsourcing Market; Jia, Bing; Zhang, Chuxuan; Hao, Lifei
- PJC: A multi-source method for identifying information dissemination in networks; Ding, Yong; Cui, Xiaoqing; Wang, Huiyong; Wang, Yujue
- vm-CFI: VM-Embedded Execution for Control-Flow Integrity; Cheng, Xiaoyang; Jia, Chunfu
- A privacy-preserving palmprint authentication scheme based on ElGamal; Ding, Yong; Wang, Huiyong; Gao, Zhiqiang; Wang, Yujue; Fan, Kefeng; Tang, Shijie
- Steganalysis of Adaptive Multiple-rate Speech Using Parity of Pitch-delay Value; Liu, Xiaokang; Tian, Hu; Liu, Jie; Li, Xiang; Lu, Jing
- Public Auditing of Log Integrity for Cloud Storage Systems via Blockchain; Wang, Jia; Peng, Fang; Tian, Hui; Chen, Wenqi; Lu, Jing
- Detection of Steganography in AMR Speech Based on Pulse Correlation and Multi-classifiers Combination; Liu, Jie; Tian, Hui; Liu, Xiaokang; Lu, Jing
- A General Hardware Trojan Technique Targeted on Lightweight Cryptography with Bit-serial Structure; Yang, Yijun; Wu, Liji; Yuan, Ye; Zhang, Xiangmin
- A Multi-Objective Service Selection Method Based on Artificial Fish Swarm for QoE Restrictions in the Internet of Things; Jia, Bing; Zhang, Chuxuan; Hao, Lifei
- Invulnerability Assessment of Cyber-Physics Systems for Blockchain Environment; Peng, Hao; Kan, Zhe; Zhao, Dandan; Zheng, zhonglong
- Security Assessment for Cascading Failures of Cyber-Physical Systems under Target attack Strategy; Peng, Hao; Kan, Zhe; Zhao, Dandan; Han, Jianmin
- Reliability Analysis of Coupled Cyber-Physical Systems under Different Network Types; Peng, Hao; Kan, Zhe; Zhao, Dandan; Han, Jianmin
- Threshold Signature Scheme with Strong Forward Security Based on Chinese Remainder Theorem; Cheng, Yage; Jia, Zhijuan; Gong, Bei; Wang, Lipeng; Lei, Yanfang
- A Reverse Auction Incentive Mechanism Based on Participant Behavior and Data Quality in Crowdsensing Networks; Jia, Bing; Zhou, Tao; Li, Wuyungerile
- A Blind signature scheme Applying on Electronic Payment Scene based on Quantum Secret Sharing; Zhang, Jia-Lei; Hu, Ming-Sheng; Gong, Bei; Jia, Zhi-Juan; Wang, Li-Peng
- Fog-enabled Smart Campus: Architecture and Challenges; Tang, Chaogang; Xia, Shixiong; Liu, Chong; Wei, Xianglin; Bao, Yu; Chen, Wei
- A New Signcryption Scheme Based on Elliptic Curves; Cui, Wenjun; Jia, Zhijuan; Hu, Mingsheng; Gong, Bei; Wang, Lipeng
- Design and Implementation of a Lightweight Intrusion Detection and Prevention System; wei, xiaogang
- An Effective Encryption Scheme on Outsourcing Data for Query on Cloud Platform; Tang, Jianchao; Fu, Shaojing; Xu, Ming
- Design of an Improved Group Decision Making Medical Diagnosis Expert System based on Dynamic Knowledge Base; Zong, Na; Li, Wuyungerile; Li, Pengyu; Jia, Bing
- Gathering Pattern Mining Method based on Trajectory Data Stream; Xia, Ying; Diao, Lian; Zhang, Xu; Bae, Hae-young
- Privacy in Location-Based Services: Present Facts and Future Path; Sahnoune, Zakaria; Aïmeur, Esma
- SGX-based Security Indexing System; Kuiyuan, Fu; Yuanjing, Zhang; Jian, Xu
- An Ant Colony Optimization Fuzzy Clustering Task Scheduling Algorithm in Mobile Edge Computing; Liu, Jianwei; Wei, Xianglin; Wang, Tongxiang; Wang, Junwei
- Research on Multi Domain Based Access Control in Intelligent Connected Vehicle; Wang, kaiyu; Liu, nan; Xiu, Jiapeng; yang, zhengqiu
- Optional Parameter Database Query System; Jia, Jingyu; Wu, Yuduo; Guo, Yue; Gao, Jiqiang; Peng, Jin; Ran, Peng; Li, Min; Liu, Zheli
- Anomaly Detection of Vehicle CAN Network based on Message Content; Chen, Pengyuan; Mo, Xiuliang; Wang, Chundong
- A Network Security Assessment Model Based on Hidden Markov Model and Attack Graph; Ye, Xin; Wang, Chundong
- Android malware detection based on sensitive permissions and APIs; Zhao, Chunhui; Wang, Chundong; Zheng, Wenbai
- Two-level Feature Selection Method for Low Detection Rate Attacks in Intrusion Detection; Wang, Chundong; Ye, Xin; Gong, Liangyi
- Travel Modes Recognition Method Based on Mobile Phone Signaling Data; Xia, Ying; Tang, Jie; Zhang, Xu; Bae, Hae-young
- Research on Network Intrusion Detection Method Based on Improved Convolutional Neural Network; Yang, Hongyu; Wang, Fengyan
- A one-way variable threshold proxy re-signature scheme for mobile internet; Lei, Yanfang; Hu, Mingsheng; Gong, Bei; Wang, Lipeng; Cheng, Yage
- Grid partition and agglomeration for bidirectional hierarchical clustering; wu, lei; chen, hechang; yu, xiangchun; yu, zhezhou; dou, ruiting; sun, chao
- FIREWORK: Fog orchestration for secure IoT networks; Vahabi, Maryam; Fotouhi, Hossein; Björkman, Mats
- An Optimized Static Propositional Function Model to Detect Software Vulnerability; Han, Lansheng; Zhou, Man; Wang, Ting; Fu, Cai; Zou, Deqing
- A Fixed point view: A Unified Clustering Framework and Hierarchical Distribution Network; Han, Lansheng; Zhou, Man
- Intrusion Detection Model for IoT Heterogeneous Perceptual Network Based on Game Theory; Zhou, Man; Han, Lansheng; Lu, Hongwei; Fu, Cai
- Quantum-Based Particle Swarm Clustering Algorithm to Identify Collaborative Malicious Behaviour; Zhou, Man; Han, Lansheng; Lu, Hongwei; Fu, Cai
- Throughput analysis of IEEE 802.11 wireless network under jamming attack; Wang, Tongxiang; Wei, Xianglin; Liu, JIanwei; Wang, Junwei
- A Novel Wireless Sensor Networks Malicious Node Detection Method; Yang, Hongyu; Zhang, Xugao; Cheng, Fang
- Secure Multi-keyword Fuzzy Search Supporting Logic Query over Encrypted Cloud Data; Zhang, Qi; Fu, Shaojing; Jia, Nan
- Privacy Disclosures Detection in Natural-Language Text Through Linguistically-motivated Artificial Neural Networks; Mehrpouyan, Hoda; Mehdy, Nuhil; Kenningto, Casey
- A graded reversible watermarking scheme for relational data; Hou, Ruitao; Xian, Hequn
- Research on Social Networks Publishing Method under Differential Privacy; Wang, Han; Li, Shuyu
- A Survey of Trusted Network Trust Evaluation Methods; Yin, Ansheng
- A non-repudiable dynamic provable data possession; Tian, FengJun; Guo, FangRui; Jing, Xuan
- FDSCD:Fast Deletion Scheme of Cloud Data; Tian, ChiYue; Shao, Tong; Li, Zhen
- Lightweight Secure Cloud Auditing Scheme for Shared Data Supporting Identity Privacy and Traceability;Tian, Junfeng; Jing, Xuan
- Research on Logistics Distribution Vehicle Scheduling Algorithm Based on Cloud Computing; Liu, Huwei
- Cloud Security Solution Based on Software Defined Network; Li, Zhaochan; Wang, Jinlong
- Research on drug regulation mode in the age of the Internet of things; Zhao, Yan; Liu, Hu Wei
- Application of Big Data Technology in JD; Shi, Ning; Fan, Xiani
- Research on Big Data Platform Security Strategy Based on Cloud Computing; Niu, Xiaxia; Zhao, Yan
- ObliviSSE: a more secure searchable symmetric encryption with an efficient search; Lu, Hang
- CRM-ORAM: Practical Contention-Resistant Multi-User ORAM Without Trusted Center; Wang, Yiwei
- ShadowFPE: New Encrypted Web Application Solution based on Shadow DOM; Li, Weicai